Symbol: KEY
lib/libexpat/lib/xmlparse.c
226
KEY name;
lib/libexpat/lib/xmlparse.c
237
static size_t keylen(KEY s);
lib/libexpat/lib/xmlparse.c
574
static NAMED *lookup(XML_Parser parser, HASH_TABLE *table, KEY name,
lib/libexpat/lib/xmlparse.c
7828
keyeq(KEY s1, KEY s2) {
lib/libexpat/lib/xmlparse.c
7836
keylen(KEY s) {
lib/libexpat/lib/xmlparse.c
7850
hash(XML_Parser parser, KEY s) {
lib/libexpat/lib/xmlparse.c
7861
lookup(XML_Parser parser, HASH_TABLE *table, KEY name, size_t createSize) {
regress/lib/libc/db/dbtest.c
171
state = KEY;
regress/lib/libc/db/dbtest.c
189
state = KEY;
regress/lib/libc/db/dbtest.c
196
state = KEY;
regress/lib/libc/db/dbtest.c
207
state = KEY;
regress/lib/libc/db/dbtest.c
223
state = KEY;
regress/lib/libc/db/dbtest.c
258
if (state != KEY)
regress/lib/libc/db/dbtest.c
266
if (state != KEY)
regress/lib/libcrypto/aead/aeadtest.c
137
if (!EVP_AEAD_CTX_init(ctx, aead, bufs[KEY], lengths[KEY],
regress/lib/libcrypto/aead/aeadtest.c
231
if (!EVP_EncryptInit_ex(ctx, NULL, NULL, bufs[KEY], NULL)) {
regress/lib/libcrypto/aead/aeadtest.c
326
if (!EVP_DecryptInit_ex(ctx, NULL, NULL, bufs[KEY], NULL)) {
regress/lib/libm/fpaccuracy/header.h
62
for ( SORTj=SORTi+SORTd; SORTj<=(up) && KEY((t)) > KEY((r)[SORTj]); SORTj+=SORTd ) \
usr.bin/indent/args.c
272
case KEY:
usr.bin/indent/args.c
80
{ "T", PRO_SPECIAL, 0, KEY, 0 },
usr.bin/vi/vi/vi.c
504
KEY(vp->buffer, 0);
usr.bin/vi/vi/vi.c
507
KEY(key, EC_MAPCOMMAND);
usr.bin/vi/vi/vi.c
520
KEY(key, EC_MAPCOMMAND);
usr.bin/vi/vi/vi.c
535
KEY(vp->buffer, 0);
usr.bin/vi/vi/vi.c
538
KEY(key, EC_MAPCOMMAND);
usr.bin/vi/vi/vi.c
633
KEY(vp->buffer, 0);
usr.bin/vi/vi/vi.c
656
KEY(key, 0);
usr.bin/vi/vi/vi.c
671
KEY(vp->character, 0);
usr.bin/vi/vi/vi.c
676
KEY(vp->character, 0);
usr.bin/vi/vi/vi.c
692
KEY(vp->character, 0);
usr.sbin/acme-client/parse.y
107
%token DOMAIN ALTERNATIVE NAME NAMES CERT FULL CHAIN KEY SIGN WITH
usr.sbin/acme-client/parse.y
226
| ACCOUNT KEY STRING keytype {
usr.sbin/acme-client/parse.y
333
| DOMAIN KEY STRING keytype {
usr.sbin/acme-client/parse.y
522
{"key", KEY},
usr.sbin/bgpd/parse.y
2294
| TCP MD5SIG KEY string {
usr.sbin/bgpd/parse.y
252
%token TCP MD5SIG PASSWORD KEY TTLSECURITY
usr.sbin/bgpd/parse.y
3609
{ "key", KEY },
usr.sbin/httpd/parse.y
139
%token COMBINED CONNECTION DHE DIRECTORY ECDHE ERR FCGI INDEX IP KEY LIFETIME
usr.sbin/httpd/parse.y
1483
{ "key", KEY },
usr.sbin/httpd/parse.y
874
| KEY STRING {
usr.sbin/ldpd/parse.y
148
%token TCP MD5SIG PASSWORD KEY
usr.sbin/ldpd/parse.y
452
| TCP MD5SIG KEY STRING {
usr.sbin/ldpd/parse.y
930
{"key", KEY},
usr.sbin/mtree/misc.c
53
static KEY keylist[] = {
usr.sbin/mtree/misc.c
78
KEY *k, tmp;
usr.sbin/mtree/misc.c
82
k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
usr.sbin/mtree/misc.c
83
sizeof(KEY), keycompare);
usr.sbin/mtree/misc.c
95
return (strcmp(((KEY *)a)->name, ((KEY *)b)->name));
usr.sbin/relayd/parse.y
1316
| CA KEY STRING PASSWORD STRING {
usr.sbin/relayd/parse.y
181
%token MATCH PARAMS RANDOM LEASTSTATES SRCHASH KEY CERTIFICATE PASSWORD ECDHE
usr.sbin/relayd/parse.y
2464
{ "key", KEY },
usr.sbin/smtpd/parse.y
180
%token KEY
usr.sbin/smtpd/parse.y
2723
{ "key", KEY },
usr.sbin/smtpd/parse.y
419
| KEY STRING {
usr.sbin/smtpd/parse.y
576
SRS KEY STRING {
usr.sbin/smtpd/parse.y
579
| SRS KEY BACKUP STRING {